• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 1
  • Tagged with
  • 42
  • 42
  • 42
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Network security services for flows and multicasts /

Wong, Chung Kei, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 129-135). Available also in a digital version from Dissertation Abstracts.
22

CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network /

LaMore, Robert L. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Cynthia Irvine, Paul Clark. Includes bibliographical references (p. 189-190). Also available online.
23

A CyberCIEGE scenario illustrating multilevel secrecy issues in an air operations center environment /

Meyer, Marc K. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Cynthia Irvine, Paul C. Clark. Includes bibliographical references (p. 167-168). Also available online.
24

Secure distributed single sign-on with two-factor authentication /

Brasee, Kaleb. January 2007 (has links)
Thesis (M.S.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
25

An approach to graph-based modeling of network exploitations

Li, Wei, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
26

Exploring extensions of traditional honeypot systems and testing the impact on attack profiling

McGrew, Robert Wesley, January 2005 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
27

Secure overlay multicast /

Yiu, Wai-Pun. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
28

Process forensics the crossroads of checkpointing and intrusion detection /

Foster, Mark S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 97 pages. Includes vita. Includes bibliographical references.
29

Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /

Young, Randall Frederick. Windsor, John C., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, August, 2008. / Title from title page display. Includes bibliographical references.
30

Securing the IT acquisition secruity chain : security concerns and human factors in IT acquisition /

Goldman, Eric. January 2010 (has links)
Typescript. Includes bibliographical references.

Page generated in 0.079 seconds